Pag ibig - hdmf application form aug 09 092809simplejd
This document is a loan application form for a multi-purpose loan from the Pag-IBIG Fund, a Philippine government-run savings fund. The 3-page form collects personal and employment information from applicants and includes sections for the applicant's agreement to loan terms, promissory note, and loan guidelines. Applicants must be Pag-IBIG members making monthly contributions for at least 24 months to qualify. The form allows members to apply for loans up to 60-80% of their total savings balance for housing, education, or other purposes. It outlines the loan approval process, interest rates, payment schedules and consequences of late or non-payment.
The document provides tips for securing online activities in 3 main areas:
1. Use a VPN to protect your local internet connection and encrypt all traffic. Also use TOR to browse anonymously and hide your IP address.
2. Pre-encrypt files before storing them online using tools like AES Crypt to maintain control over sensitive data.
3. Limit information shared on social media and use strong, unique passwords for all accounts, along with a password manager.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Pag ibig - hdmf application form aug 09 092809simplejd
This document is a loan application form for a multi-purpose loan from the Pag-IBIG Fund, a Philippine government-run savings fund. The 3-page form collects personal and employment information from applicants and includes sections for the applicant's agreement to loan terms, promissory note, and loan guidelines. Applicants must be Pag-IBIG members making monthly contributions for at least 24 months to qualify. The form allows members to apply for loans up to 60-80% of their total savings balance for housing, education, or other purposes. It outlines the loan approval process, interest rates, payment schedules and consequences of late or non-payment.
The document provides tips for securing online activities in 3 main areas:
1. Use a VPN to protect your local internet connection and encrypt all traffic. Also use TOR to browse anonymously and hide your IP address.
2. Pre-encrypt files before storing them online using tools like AES Crypt to maintain control over sensitive data.
3. Limit information shared on social media and use strong, unique passwords for all accounts, along with a password manager.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A married couple can lose $250,000 in Social Security benefits over their lifetime if they use the wrong claiming strategy. While most people think they should claim benefits as early as possible at age 62, waiting until full retirement age of 66 or 70 can result in higher monthly benefits. The document discusses several common myths about Social Security, such as that the program is going broke or that income from benefits is completely tax-free. It provides the realities of the current financial status of Social Security and rules regarding taxation of benefits. The summary aims to help readers understand important rules and strategies when planning for Social Security income during retirement.
School staff are required to call both child welfare authorities (the State Central Registry Hotline at 1-877-NJ ABUSE) and local law enforcement to report suspected child abuse. When calling authorities, staff should be prepared to provide specific details about the individuals involved, the nature of the abuse, and related incidents. Staff should make the call from school rather than delaying or calling from elsewhere. Errring on the side of caution by reporting suspected abuse helps protect children, while failure to report can result in legal consequences for the staff member.
Social Security Number_ How Can I Get a SSN Number_.pdfmilewits415
A Social Security Number (SSN) is a unique nine-digit identifier assigned to individuals living in the United States. It serves as a primary means of identification for various purposes, including employment, taxation, and accessing government services. Think of it as your personal ID number that tracks important aspects of your financial and social life. The purpose of an Social Security Office Near Me goes beyond just being a random string of numbers. It acts as a key that unlocks doors to numerous opportunities and benefits in society. From applying for loans or credit cards to filing tax returns or receiving retirement benefits, having an SSN is essential.
I received spoofed emails from the BBB New York, and then fake communication from Amazon, but the BBB went to the police. Somehow, they say my post or contact.
AlphaStaff Webinar Importance of Drug and Background ScreeningAlphaStaff
Hiring someone is a decision that should not be based solely on the person’s ability to handle the job. While skills required to conduct the job are necessary, one cannot rule out threats caused by an employee with a checkered past (or present). Someone with a criminal record or someone who isn’t who they say they are can potentially cause significant damage to the welfare of the company and its staff.
This webinar, led by one of the country’s premier background check and drug screening companies and a key partner of AlphaStaff, will highlight the need, the process and the advantages of proper pre-employment screenings. Presented by Sterling Infosystems.
OLDER AMERICANS Inability to Repay Student Loans May Affect Financial Secur...Mauro Bassotti
Recent studies have indicated that
many Americans may be approaching
their retirement years with increasing
levels of various kinds of debt. Such
debt can reduce net worth and income,
thereby diminishing overall retirement
financial security. Student loan debt
held by older Americans can be
especially daunting because unlike
other types of debt, it generally cannot
be discharged in bankruptcy. GAO was
asked to examine the extent of student
loan debt held by older Americans and
the implications of default.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The document summarizes cyber threat trends in 2018 according to a Symantec report. It saw a rise in formjacking attacks that steal payment card data, though cryptojacking activity declined along with cryptocurrency values. Ransomware infections decreased overall but rose for enterprises. Living off the land attacks using tools like PowerShell increased substantially. Targeted attacks grew more sophisticated with groups targeting operational systems and destructive malware.
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
This guide aims to help journalists understand their rights at protests and avoid arrest when reporting on these events. It summarizes the legal landscape and provides strategies and tools to help journalists avoid incidents with police and navigate them successfully should they arise. Credit RCFP.Org
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
Verizon Publishes 2020 Data Breach Investigation Report (DBIR) With Insights From Thousands of Confirmed Breaches. Verizon's 2020 Data Breach Investigations Report (DBIR) is the most extensive yet, with 81 contributing organizations, and more than 32,000 incidents analyzed (of which 3,950 were confirmed breaches). Credit:Verizon
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
A Resource Guide to theU.S. Foreign Corrupt Practices Act
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
The FTC takes in reports from consumers about problems they experience in the marketplace. The reportsare stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to lawenforcement. While the FTC does not intervene in individual consumer disputes, its law enforcementpartners – whether they are down the street, across the nation, or around the world – can use informationin the database to spot trends, identify questionable business practices and targets, and enforce the law.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
Below is a list of consumer reporting companies updated for 2019.1 Consumer reporting companies collect information and provide reports to other companies about you. These companies use these reports to inform decisions about providing you with credit, employment, residential rental housing, insurance, and in other decision making situations. The list below includes the three nationwide consumer reporting companies and several other reporting companies that focus on certain market areas and consumer segments. The list gives you tips so you can determine which of these companies may be important to you. It also makes it easier for you to take advantage of your legal rights to (1) obtain the information in your consumer reports, and (2) dispute suspected inaccuracies in your reports with companies as needed.
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
Transnational criminal organizations (TCOs), foreign fentanyl suppliers, and Internet purchasers located in the United States engage in the trafficking of fentanyl, fentanyl analogues, and other synthetic opioids and the subsequent laundering of the proceeds from such illegal sales.
The mission of the IC3 is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity, and to develop effective alliances with industry partners. Information is analyzed and disseminated for investigative and intelligence purposes, for law enforcement, and for public awareness.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
A married couple can lose $250,000 in Social Security benefits over their lifetime if they use the wrong claiming strategy. While most people think they should claim benefits as early as possible at age 62, waiting until full retirement age of 66 or 70 can result in higher monthly benefits. The document discusses several common myths about Social Security, such as that the program is going broke or that income from benefits is completely tax-free. It provides the realities of the current financial status of Social Security and rules regarding taxation of benefits. The summary aims to help readers understand important rules and strategies when planning for Social Security income during retirement.
School staff are required to call both child welfare authorities (the State Central Registry Hotline at 1-877-NJ ABUSE) and local law enforcement to report suspected child abuse. When calling authorities, staff should be prepared to provide specific details about the individuals involved, the nature of the abuse, and related incidents. Staff should make the call from school rather than delaying or calling from elsewhere. Errring on the side of caution by reporting suspected abuse helps protect children, while failure to report can result in legal consequences for the staff member.
Social Security Number_ How Can I Get a SSN Number_.pdfmilewits415
A Social Security Number (SSN) is a unique nine-digit identifier assigned to individuals living in the United States. It serves as a primary means of identification for various purposes, including employment, taxation, and accessing government services. Think of it as your personal ID number that tracks important aspects of your financial and social life. The purpose of an Social Security Office Near Me goes beyond just being a random string of numbers. It acts as a key that unlocks doors to numerous opportunities and benefits in society. From applying for loans or credit cards to filing tax returns or receiving retirement benefits, having an SSN is essential.
I received spoofed emails from the BBB New York, and then fake communication from Amazon, but the BBB went to the police. Somehow, they say my post or contact.
AlphaStaff Webinar Importance of Drug and Background ScreeningAlphaStaff
Hiring someone is a decision that should not be based solely on the person’s ability to handle the job. While skills required to conduct the job are necessary, one cannot rule out threats caused by an employee with a checkered past (or present). Someone with a criminal record or someone who isn’t who they say they are can potentially cause significant damage to the welfare of the company and its staff.
This webinar, led by one of the country’s premier background check and drug screening companies and a key partner of AlphaStaff, will highlight the need, the process and the advantages of proper pre-employment screenings. Presented by Sterling Infosystems.
OLDER AMERICANS Inability to Repay Student Loans May Affect Financial Secur...Mauro Bassotti
Recent studies have indicated that
many Americans may be approaching
their retirement years with increasing
levels of various kinds of debt. Such
debt can reduce net worth and income,
thereby diminishing overall retirement
financial security. Student loan debt
held by older Americans can be
especially daunting because unlike
other types of debt, it generally cannot
be discharged in bankruptcy. GAO was
asked to examine the extent of student
loan debt held by older Americans and
the implications of default.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Similar to Potential Misuse of Foster Children’s Social Security Numbers (7)
The document summarizes cyber threat trends in 2018 according to a Symantec report. It saw a rise in formjacking attacks that steal payment card data, though cryptojacking activity declined along with cryptocurrency values. Ransomware infections decreased overall but rose for enterprises. Living off the land attacks using tools like PowerShell increased substantially. Targeted attacks grew more sophisticated with groups targeting operational systems and destructive malware.
The FBI is the lead federal agency for investigating malicious cyber activity by criminals, nation-state adversaries, and terrorists. To fulfill this mission, the FBI often develops resources to enhance operations and collaboration. One such resource is the FBI’s Internet Crime Complaint Center (IC3) which provides the public with a trustworthy and convenient mechanism for reporting information concerning suspected Internet-facilitated criminal activity. At the end of every year, the IC3 collates information collected into an annual report.
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
This guide aims to help journalists understand their rights at protests and avoid arrest when reporting on these events. It summarizes the legal landscape and provides strategies and tools to help journalists avoid incidents with police and navigate them successfully should they arise. Credit RCFP.Org
Credit is due to all original authors and no financial gain was made from the blog, Simply sharing an interesting story for educational purposes,
Verizon Publishes 2020 Data Breach Investigation Report (DBIR) With Insights From Thousands of Confirmed Breaches. Verizon's 2020 Data Breach Investigations Report (DBIR) is the most extensive yet, with 81 contributing organizations, and more than 32,000 incidents analyzed (of which 3,950 were confirmed breaches). Credit:Verizon
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
A Resource Guide to theU.S. Foreign Corrupt Practices Act
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
The FTC takes in reports from consumers about problems they experience in the marketplace. The reportsare stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to lawenforcement. While the FTC does not intervene in individual consumer disputes, its law enforcementpartners – whether they are down the street, across the nation, or around the world – can use informationin the database to spot trends, identify questionable business practices and targets, and enforce the law.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
Below is a list of consumer reporting companies updated for 2019.1 Consumer reporting companies collect information and provide reports to other companies about you. These companies use these reports to inform decisions about providing you with credit, employment, residential rental housing, insurance, and in other decision making situations. The list below includes the three nationwide consumer reporting companies and several other reporting companies that focus on certain market areas and consumer segments. The list gives you tips so you can determine which of these companies may be important to you. It also makes it easier for you to take advantage of your legal rights to (1) obtain the information in your consumer reports, and (2) dispute suspected inaccuracies in your reports with companies as needed.
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
Transnational criminal organizations (TCOs), foreign fentanyl suppliers, and Internet purchasers located in the United States engage in the trafficking of fentanyl, fentanyl analogues, and other synthetic opioids and the subsequent laundering of the proceeds from such illegal sales.
The mission of the IC3 is to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity, and to develop effective alliances with industry partners. Information is analyzed and disseminated for investigative and intelligence purposes, for law enforcement, and for public awareness.
Credit is due to all original authors and no financial gain was made from the report, Simply sharing an interesting story for educational purposes,
This report is built upon analysis of 41,686 security incidents, of which 2,013 were confirmed data breaches. We will take a look at how results are changing (or not) over the years as well as digging into the overall threat landscape and the actors, actions, and assets that are present in breaches. Windows into the most common pairs of threat actions and affected assets also are provided.
The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission
to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models.
Sentinel sorts consumer reports into 29 top categories. Appendices B1 – B3 describe the categories,providing details, and three year figures. To reflect marketplace changes, new categories or subcategories are created or deleted over time.The Consumer Sentinel Network Data Book excludes the National Do Not Call Registry. A separate report about these complaint statistics is available at: https://www.ftc.gov/reports/national-do-not-call-registry-data-book-fiscal-year-2018. The Sentinel Data Book also excludes reports about unsolicited commercial email.Consumers can report as much or as little detail as they wish when they file a report. For the Sentinel Data Book graphics, percentages are based on the total number of Sentinel fraud, identity theft, and other report types in 2018 in which consumers provided the information displayed on each chart.Reports to Sentinel sometimes indicate money was lost, and sometimes indicate no money was lost.Often, people make these reports after they experience something problematic in the marketplace,avoid losing any money, and wish to alert others. Except where otherwise stated, numbers are based on reports both from people who indicated a loss and people who did not.Calculations of dollar amounts lost are based on reports in which consumers indicated they lost between $1 and $999,999. Prior to 2017, reported “amount paid” included values of $0 to $999,999.States and Metropolitan Areas are ranked based on the number of reports per 100,000 population.State rankings are based on 2017 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2017). Metropolitan Area rankings are based on 2016 U.S. Census population estimates (Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2016).This Sentinel Data Book identifies Metropolitan Areas (Metropolitan and Micropolitan Statistical Areas)with a population of 100,000 or more except where otherwise noted. Metropolitan areas are defined by Office of Management and Budget Bulletin No. 15-01, “Revised Delineations of Metropolitan Statistical Areas, Micropolitan Statistical Areas, and Combined Statistical Areas, and Guidance on Uses of the Delineations of These Areas” (July 15, 2015). Numbers change over time. The Sentinel Data Book sorts consumer reports by year, based on the date of the consumer’s report. Some data contributors transfer their complaints to Sentinel after the end of the calendar year, and new data providers often contribute reports from prior years. As a result, the total number of reports for 2018 will likely change during the next few months, and totals from previous years may differ from prior Consumer Sentinel Network Data Books. The most up to date information can be found online at ftc.gov/data
A credit score is a three -digit number that predicts how likely you are to pay back a loan on time, based on information from your credit reports.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. - Medical identity theft has existed in various forms for decades, but it was in 2006 that World Privacy Forum published the first major report about the crime. The report called for medical data breach notification laws and more research about medical identity theft and its impacts. Since that time, medical data breach notification laws have been enacted, and other progress has been made, particularly in the quality of consumer complaint datasets gathered around identity theft, including medical forms of the crime. This report uses new data arising from consumer medical identity theft complaint reporting and medical data breach reporting to analyze and document the geography of medical identity theft and its growth patterns. The report also discusses new aspects of consumer harm resulting from the crime that the data has brought to light
The FTC takes in reports from consumers about problems they experience in the marketplace. The reports are stored in the Consumer Sentinel Network (Sentinel), a secure online database available only to law enforcement. While the FTC does not intervene in individual consumer disputes, its law enforcement partners – whether they are down the street, across the nation, or around the world – can use information in the database to spot trends, identify questionable business practices and targets, and enforce the law.
Since 1997, Sentinel has collected tens of millions of reports from consumers about fraud, identity theft, and other consumer protection topics. During 2017, Sentinel received nearly 2.7 million consumer reports, which the FTC has sorted into 30 top categories. The 2017 Consumer Sentinel Network Data Book (Sentinel Data Book) has a vibrant new look, and a lot more information about what consumers told us last year. You'll know more about how much money people lost in the aggregate, the median amount they paid, and what frauds were most costly. And you'll know much more about complaints of identity theft, fraud, and other types of problems in each state, too. The Sentinel Data Book is based on unverified reports filed by consumers. The data is not based on a consumer survey. Sentinel has a five-year data retention policy, with reports older than five years purged biannually.
This guide addresses the steps to take once a
breach has occured. For advice on implementing a
plan to protect consumers’ personal information, to
prevent breaches and unauthorized access, check
out the FTC’s Protecting Personal Information: A
Guide for Business and Start with Security: A Guide
for Business.
*Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
FTC Consumer Sentinel Network Law enforcement's source for consumer complaints.
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Procrastination is a common challenge that many individuals face when it comes to completing tasks and achieving goals. It can hinder productivity and lead to feelings of stress and frustration.
However, with the right strategies and mindset, it is possible to overcome procrastination and increase productivity.
In this article, we will explore the causes of procrastination, how to recognize the signs of procrastination in oneself, and effective strategies for overcoming procrastination and boosting productivity.
Understanding of Self - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
You may be stressed about revealing your cancer diagnosis to your child or children.
Children love stories and these often provide parents with a means of broaching tricky subjects and so the ‘The Secret Warrior’ book was especially written for CANSA TLC, by creative writer and social worker, Sally Ann Carter.
Find out more:
https://cansa.org.za/resources-to-help-share-a-parent-or-loved-ones-cancer-diagnosis-with-a-child/
As we navigate through the ebbs and flows of life, it is natural to experience moments of low motivation and dwindling passion for our goals.
However, it is important to remember that this is a common hurdle that can be overcome with the right strategies in place.
In this guide, we will explore ways to rekindle the fire within you and stay motivated towards your aspirations.
Inspire: Igniting the Spark of Human Potentialgauravingole9
Inspire: Igniting the Spark of Human Potential
Inspiration is the force that propels individuals from ordinary to extraordinary. It transforms ideas into innovations, dreams into realities, and individuals into icons. This article delves into the multifaceted nature of inspiration, exploring its sources such as nature, art, personal experiences, and the achievements of others, and its profound impact on personal growth, societal progress, and cultural evolution. Through the lens of historical figures and timeless quotes, we uncover how inspiration fuels creativity, drives societal change, and ignites the spark of human potential.
2. MEMORANDUM
Date:
September 25, 2013
Refer To:
To:
The Commissioner
From:
Inspector General
Subject:
Potential Misuse of Foster Children’s Social Security Numbers (A-08-12-11253)
The attached final report presents the results of our audit. Our objective was to assess the
potential misuse of foster children’s Social Security numbers.
If you wish to discuss the final report, please call me or have your staff contact
Steven L. Schaeffer, Assistant Inspector General for Audit, at (410) 965-9700.
Patrick P. O’Carroll, Jr.
Attachment
3. Potential Misuse of Foster Children’s Social Security Numbers
A-08-12-11253
September 2013
Office of Audit Report Summary
Objective
Our Findings
To assess the potential misuse of foster
children’s Social Security numbers
(SSN).
Our analysis of earnings information disclosed potential misuse of
foster children’s SSNs for work, credit, and other purposes. For
example, we identified over 3,600 (4 percent) foster children who
had wage items in SSA’s Earnings Suspense File. We believe the
multiple names and employers associated with these SSNs may
indicate SSN misuse. We also identified 67 foster children who
had earnings posted to SSA’s Master Earnings File. We believe
these earnings may indicate SSN misuse because the foster children
had wages from employers not generally associated with the
employment of young children, such as agriculture, construction,
and food service.
Background
Recent studies have shown that
children are at risk for identity theft
and SSN misuse. Children make an
attractive target for identity thieves
because they do not usually discover
the crime until they reach adulthood
and apply for credit. Foster children
may be at a higher risk of identity theft
because their sensitive personal
information (including SSNs) passes
through the hands of many individuals
as they move around the foster care
system. Furthermore, young adults
leaving the foster care system may
learn they cannot obtain credit or get a
job because someone misused their
SSNs while they were in foster care.
To accomplish our objective, we
identified a population of over
96,000 foster children (under age 14)
in the 5 States with the largest number
of foster children. To determine
whether these children’s SSNs were
potentially misused for work, we
reviewed wage items in SSA’s
earnings records. We also worked
with a national credit reporting agency
(CRA) to determine whether these
children’s SSNs were potentially
misused for credit. In addition, we
conducted online research to determine
other potential misuse of their SSNs,
such as obtaining a driver’s license.
Of the 96,000 foster children in our population, the CRA estimated
that over 4,900 (5 percent) had credit files that contained evidence
that someone may have used their SSNs for credit or other
purposes. For these credit files, someone used the child’s SSN for
most, or all, of the individual credit items in the file, including
utilities, credit cards, and installment loans. Because of the
numerous incidents of identity theft and the recognition that SSNs
are linked to vast amounts of sensitive personal information, some
States have taken actions to address identity theft involving foster
children.
Our Recommendations
1. Partner with State and local governments to inform the foster
care community about the potential risks associated with
collecting and using SSNs as identifiers or for other purposes.
2. Encourage State and local governments to reduce unnecessary
collection and use of foster children’s SSNs and implement
stringent safeguards to protect SSNs when collected. For
example, remove SSNs from foster children’s identification
cards and other caregiver paperwork.
3. Promote the best practices of States that have taken steps to
address SSN misuse and identity theft involving foster children.
SSA agreed with our recommendations.
4. TABLE OF CONTENTS
Objective ..........................................................................................................................................1
Background ......................................................................................................................................1
Results of Review ............................................................................................................................2
SSNs Used for Work..................................................................................................................3
SSNs Used for Credit .................................................................................................................3
Foster Children’s Risk of Identity Theft ....................................................................................4
Steps Taken to Address Identity Theft Involving Foster Children ............................................5
Conclusions ......................................................................................................................................6
Recommendations ............................................................................................................................6
Agency Comments ...........................................................................................................................6
Appendix A – Scope and Methodology ..................................................................................... A-1
Appendix B – Agency Comments .............................................................................................. B-1
Appendix C – Major Contributors.............................................................................................. C-1
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
5. ABBREVIATIONS
CRA
Credit Reporting Agency
ESF
Earnings Suspense File
MEF
Master Earnings File
OI
Office of Investigations
OIG
Office of the Inspector General
SSA
Social Security Administration
SSN
Social Security Number
Stat.
Statutes at Large
U.S.C.
United States Code
YCER
Young Children’s Earnings Record
Form
W-2
Wage and Tax Statement
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
6. OBJECTIVE
Our objective was to assess the potential misuse of foster children’s Social Security numbers
(SSN).
BACKGROUND
Recent studies have shown that children are at risk for identity theft and SSN misuse. Children
make an attractive target for identity thieves because they do not usually discover the crime until
they reach adulthood and apply for credit. Foster children may be at a higher risk of becoming
victims of identity theft as they move around the foster care system because their sensitive
personal information (including SSNs) passes through the hands of many individuals, such as
parents, grandparents, foster parents, social workers, and group home personnel. Each time a
foster child moves to a new home, their sensitive personal information is further exposed.
Furthermore, young adults leaving the foster care system may learn they cannot obtain credit or
get a job because someone misused their SSNs while they were in foster care.
Because the Social Security Administration (SSA) calculates future benefit payments based on
the earnings an individual has accumulated over his/her lifetime, it is critical that the Agency
accurately record these earnings. SSA depends on employers and employees correctly reporting
names and SSNs on Forms W-2, Wage and Tax Statement. SSA uses automated edits to match
employees’ names and SSNs with Agency records to ensure it properly credits earnings to the
Master Earnings File (MEF). 1 SSA places wage items 2 that fail to match name and SSN records
in its Earnings Suspense File (ESF). SSA also checks the date of birth for each SSN before
posting wage items. If the SSN belongs to a child under age 7, SSA designates the wage item as
a Young Children’s Earnings Record (YCER) item and places the wage item in the ESF.
To accomplish our objective, we identified a population of over 96,000 foster children (under
age 14) in the 5 States with the largest number of children in foster care. 3 We reviewed relevant
laws, policies, and practices regarding child identity theft issues. We also reviewed wage items
in the MEF and ESF to determine potential SSN misuse for work. To determine potential SSN
misuse for credit, we provided the foster children’s names and SSNs to a national credit
reporting agency (CRA) to determine whether credit files existed and identify evidence that
someone may have used their SSNs to get credit. The credit study consisted of two phases. In
Phase I, the CRA identified approximately 13,500 foster children whose SSNs appeared on
credit headers, a part of the credit file that contained non-credit, personal information, such as
1
The MEF contains all earnings data reported by employers and self-employed individuals. SSA uses the data to
determine eligibility for, and the amount of, Social Security benefits.
2
A wage item is an individual employee report prepared by employers on a Form W-2 after the close of the calendar
year that shows wages paid and taxes withheld during the prior calendar year.
3
The five States were California, Florida, Michigan, New York, and Texas. These States account for approximately
35 percent of foster children in the United States.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
1
7. names, addresses, dates of birth, and SSNs. These files also contained information about when
each piece of information was first used and most recently used as well as how many times the
information had been reported to the CRA. Based on the source of information and how many
times the SSN had been reported, the CRA selected the name, address, and SSN used most on
the credit file. The CRA then stratified the foster children’s SSNs with credit headers into four
groups (based on the number of credit headers associated with the SSNs and whether the name
on the credit header matched the child’s name).
In Phase II, the CRA analyzed a random sample of 400 (100 from each group) foster children’s
credit files to obtain a better understanding of how someone may have used their SSNs. Because
some of the foster children had multiple credit files, the CRA analyzed 643 files to determine
whether they likely belonged to the foster child, a family member, or neither. The CRA also
identified the SSN used most in the credit file and determined whether it was the same, similar,
or different from the child’s. In addition, the CRA reviewed the credit files to determine whether
someone may have used foster children’s SSNs for various purposes, such as obtaining utilities,
credit cards, and installment loans. Finally, the CRA estimated the number of occurrences in the
population for their conclusions. See Appendix A for additional information on our scope and
methodology.
RESULTS OF REVIEW
Our analysis of earnings and the CRA’s analysis of credit information disclosed potential misuse
of foster children’s SSNs for work and credit. For example, we identified approximately
3,600 (4 percent) foster children who had wage items in the ESF because SSA’s records did not
match the reported name and SSN 4 or indicated the child was under age 7. 5 We believe the
multiple names and employers associated with many of these SSNs may indicate SSN misuse.
We also identified 67 foster children who had earnings posted to the MEF. 6 We believe these
earnings may indicate SSN misuse because many of the foster children had wages from
employers not generally associated with the employment of young children, such as agriculture,
construction, and food service.
Of the 96,000 foster children in our population, the CRA estimated that over 4,900 (5 percent)
had credit files that contained evidence that someone may have used their SSNs to get credit or
for other purposes. For these credit files, someone used the child’s SSN for most, or all, of the
individual credit items in the file, including utilities, credit cards, and installment loans. The
CRA also determined that over 8,500 (9 percent) other SSNs had credit files. However, the CRA
told us these occurrences were less likely SSN misuse, and some could have been the result of
incorrect data reported to the CRA. According to the CRA, the presence of the child’s SSN on a
4
If the name and SSN do not match, even after SSA has performed its computer matching routines, SSA cannot
credit the wages to the individual’s account. Instead, SSA places the earnings in the ESF.
5
Of the foster children in our population, 94 had at least 1 YCER item in the ESF.
6
We excluded three children who had reinstated YCER items on the MEF. SSA confirms the date of birth and
wages before transferring YCER items from the ESF to the MEF.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
2
8. credit file did not always indicate SSN misuse or identity theft. Additional online research also
disclosed evidence that individuals may have used foster children’s SSNs for utilities, driver’s
licenses, criminal filings, and voter registration.
We believe the collection and use of SSNs is a significant vulnerability for foster children.
Recent data indicate the number of children whose identities have been stolen is growing. This
is particularly troubling given that some foster children may not become aware of such activity
until they reach adulthood and apply for credit.
Because of the numerous incidents of identity theft and the recognition that SSNs are linked to
vast amounts of sensitive personal information, some States have taken steps to address identity
theft involving foster children. We are encouraged by these steps and believe SSA can help
reduce potential SSN misuse and identity theft by partnering with State and local governments to
better safeguard the sensitive and personal information of foster children.
SSNs Used for Work
Of the 96,000 foster children in our population, we identified approximately 3,600 (4 percent)
who had wage items in the ESF because SSA records did not match the reported name and SSN
or indicated the child was under age 7. Moreover, 99 of these foster children’s SSNs were
associated with 20 or more wage items in the ESF. We believe the multiple names and
employers associated with many of these SSNs may indicate SSN misuse. For example, 1 foster
child had earnings from 212 employers, and another had earnings from 87 employers.
We also identified 67 foster children who had earnings in the MEF. We believe these earnings
may indicate SSN misuse because the foster children had wages from employers that were not
generally associated with the employment of young children, such as agriculture, construction,
and food service. For example, one 10-year-old had over $28,000 in earnings from a nursing
home for 2 consecutive years. Another foster child had over $23,000 in earnings from a
restaurant. We also identified an 11-year-old who had earnings from six employers in 1 year.
We have referred all incidents of potential SSN misuse to our Office of Investigations (OI.) OI
is investigating those cases that appear to be violations of the Social Security Act and working
with the Criminal Investigations Division of the Internal Revenue Service for those cases that
appear to also be violations of Federal tax law.
SSNs Used for Credit
Of the 96,000 foster children in our population, the CRA estimated that over 4,900 (5 percent)
had credit files that contained evidence that someone had used their SSNs to obtain credit. For
these credit files, someone used the child’s SSN for most, or all, of the individual credit items in
the file. According to the CRA, individuals used the foster children’s SSNs for a variety of
purposes, the most common being utilities (household gas and electric accounts, cable, Internet,
and telephone). These accounts were most often unpaid and in collection. The CRA also found
evidence that someone used the foster children’s SSNs to obtain credit cards, installment loans,
medical services, and mortgages. For example, one foster child had eight credit files: two
included mortgages, three included utility collections, and seven included such types of credit
accounts as credit cards or installment loans.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
3
9. Additionally, the CRA identified over 8,500 (9 percent) foster children in our population with
SSNs associated with a credit file in some way. However, the CRA told us the evidence in these
credit files did not always indicate potential SSN misuse or identity theft. According to the
CRA, there could be multiple reasons why a child’s SSN is in a credit file. The CRA provided
the following explanations regarding these SSNs.
•
Incomplete or inconsistent information prevented the creation of a full credit report, even
though these SSNs were part of a credit file. The CRA told us it had guidelines on verifying
information to avoid releasing credit data to the wrong individual. When the information
available does not meet these guidelines, the CRA will not produce a credit report.
•
The foster child’s SSN could be part of the credit file because of an error. For example, a
child’s SSN could become part of a credit file when a parent guarantees payment for medical
services. In addition, the SSN could also become part of a credit file when someone makes a
typographical error on a credit application.
We also searched LexisNexis 7 for 5,000 (1,000 from each of the 5 States we reviewed) foster
children and determined that 555 (11 percent) had reports associated with their SSNs. Many of
the records indicated that someone may have used the foster children’s SSNs to obtain utilities.
We also identified instances where 12 individuals may have used the foster children’s SSNs to
obtain driver’s licenses, and 2 individuals may have used their SSNs to register to vote. We
identified other instances where the child’s SSN was associated with judgments/liens and
criminal filings.
Foster Children’s Risk of Identity Theft
Collection and use of foster children’s SSNs entails certain risks. Each time a foster child’s SSN
is used, the potential for a dishonest individual to unlawfully access and misuse the SSN
increases. Identity thieves often target children because their credit histories are clean, and their
records may be used for years before anyone realizes someone has stolen their identities or
misused their SSNs. Over the past few years, numerous cases involving identity theft and SSN
misuse involving foster children have been reported. Because States often use SSNs as a key
identifier, foster children’s exposure to identity theft and SSN misuse remains. The following
examples illustrate this risk.
•
A Federal judge sentenced a man to 6 years in prison for participating in an identity theft ring
that stole the records of children in foster homes to file fraudulent income tax returns.
•
A Wisconsin social worker found a $50,000 child support judgment on a foster child’s credit
report. The foster child’s father, an undocumented immigrant, used the child’s SSN to get a
job. The father’s wages were garnished for child support, which affected the child’s credit.
7
LexisNexis is an online service that provides comprehensive information, such as legal, news, business, and public
records.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
4
10. •
Foster parents in California used a child’s SSN to apply for credit cards and open bank
accounts. When the child left the foster care system, she spent 6 years attempting to recover
from thousands of dollars of debt and serious damage to her credit history.
•
California officials, with the assistance of 3 national credit reporting agencies, identified
104 foster children (5 percent of the project sample) in Los Angeles County, California, who
had 247 separate credit accounts opened in their names. One foster child had a
$217,000 home loan associated with their credit report. 8
Steps Taken to Address Identity Theft Involving Foster Children
Although no Federal law regulates the collection and use of foster children’s SSNs, the Child
and Family Services Improvement and Innovation Act of 2011 9 requires that States ensure each
foster child (age 16 and older) obtains a copy of a consumer credit report annually until the State
discharges the foster child from care. The Act also requires that States assist with interpreting
and resolving any inaccuracies in the credit report.
Recognizing the vulnerability of foster children, some States have enacted laws to assist foster
children with identity theft. 10 California requires that county welfare departments request credit
reports on behalf of children in foster care at age 16 to determine whether identity theft has
occurred. 11 It also requires that the counties ensure the foster children receive assistance in
resolving any inaccuracies in their credit reports, for example, the county could refer the child to
a counseling organization that provides services to victims of identity theft. We identified
several other States with similar laws. 12 A Texas Department of Family and Protective Services
official told us her department performed annual credit checks on all foster children.
We also identified instances in which some States educated foster children about identity theft.
For example, the Wisconsin Department of Children and Families developed a foster youth
identity theft brochure, tip sheet for youth and foster care coordinators, and letter to foster youth
about identity theft. These documents provide information about preventing identity theft,
checking credit reports, and resolving fraudulent account activity on credit reports. In addition,
the Michigan Department of Human Resources developed an identity theft tip sheet for child
welfare staff to use when discussing identity theft issues with foster youth. The tip sheet
8
California Office of Privacy Protection, A Better Start: Clearing Up Credit Records for California Foster
Children, August 2011.
9
Child and Family Services Improvement and Innovation Act of 2011, Pub. L. No. 112-34, § 106, 125 Stat. 377
(2011), Social Security Act § 475(5)(I), 42 U.S.C. 675(5)(I).
10
We do not intend to suggest that the States discussed in Footnotes 11 and 12 are the only States that have taken
actions to address identity theft involving foster children.
11
California Welfare and Institutions Code § 10618.6.
12
These States were Connecticut, Colorado, Delaware, Texas, and Virginia.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
5
11. instructs case managers to assist foster youth age 16 and older in requesting, obtaining, and
reviewing his/her credit report each year until he/she exits foster care.
In previous audits, 13 we identified instances in which universities and K-12 schools used SSNs as
student identifiers or for other purposes. However, numerous incidents of identity theft led some
schools to reconsider this practice. In addition, some States enacted laws to regulate the use of
SSNs. We believe State and local governments should give foster children the same protections.
CONCLUSIONS
Based on the results of this audit, we estimate that individuals may have used thousands of foster
children’s SSNs for work and to get credit. We recognize SSA cannot prohibit State and local
governments from collecting and using foster children’s SSNs. However, we believe SSA can
help reduce potential SSN misuse and identity theft by partnering with State and local
governments to better safeguard foster children’s sensitive and personal information.
RECOMMENDATIONS
We recommend that SSA:
1. Partner with State and local governments to inform the foster care community about the
potential risks associated with collecting and using SSNs as identifiers or for other purposes.
2. Encourage State and local governments to reduce unnecessary collection and use of foster
children’s SSNs and implement stringent safeguards to protect SSNs when collected. For
example, remove SSNs from foster children’s identification cards and other caregiver
paperwork.
3. Promote the best practices of States that have taken steps to address SSN misuse and identity
theft involving foster children.
AGENCY COMMENTS
SSA agreed with our recommendations. See Appendix B for the full text of the Agency’s
comments.
13
SSA OIG, Universities’ Use of Social Security Numbers as Student Identifiers in Region IV (A-08-05-15034),
December 2004, and Kindergarten Through 12th Grade Schools’ Collection and Use of Social Security Numbers
(A-08-10-11057), July 2010.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
6
13. Appendix A – SCOPE AND METHODOLOGY
To accomplish our objectives, we:
•
Reviewed applicable laws and Social Security Administration (SSA) policies and procedures.
•
Reviewed prior relevant audits reports.
•
Reviewed selected studies and articles regarding identity theft and foster children.
•
Determined the five States with the largest population of foster children using the
Department of Health and Human Services’ Administration for Children and Families report
Foster Care FY2002-FY2009 Entries, Exits, and Numbers of Children in Care on the Last
Day of Each Federal Fiscal Year as of July 29, 2010. Based on this report, we selected
California, Florida, Michigan, New York, and Texas.
•
Contacted the five States selected and obtained the names and Social Security numbers
(SSN) of foster children (as of September 30, 2011). From these 5 States, we identified a
population of 96,456 foster children under age 14.
•
Used SSA’s Enumeration Verification System to validate the SSNs the States provided.
•
Reviewed Master Earnings File (MEF) data using Detailed Earnings Queries for
2009 through 2011 and reviewed Numident 1 records for foster children with posted earnings.
•
Reviewed Earnings Suspense File (ESF) data and identified wages posted in the ESF using
the foster children’s SSNs.
•
Selected a random sample of 1,000 foster children from each State and performed
LexisNexis 2 searches using the SSNs to identify potential SSN misuse.
•
Contracted with a national credit reporting agency (CRA) to identify potential misuse of
SSNs for credit and other purposes. The credit study consisted of two phases. In Phase I, the
CRA searched existing data and identified credit header information using foster children’s
SSNs. This search produced 13,540 foster children with credit header information. In Phase
II, the CRA analyzed detailed credit files for 400 of these foster children to obtain a better
understanding of how someone may have used these SSNs. The CRA analyzed these credit
files (including name, SSN, and address) to determine whether the credit files likely
belonged to the foster child, a family member, or neither. The analysis also identified the
1
The Numident is a record of identifying information (such as name, date of birth, date of death, mother’s maiden
name, etc.) provided by the applicant on his or her application for an SSN.
2
LexisNexis is an online service that provides comprehensive information, such as legal, news, business, and public
records.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
A-1
14. SSN used for most of the individual credit items on the credit file and determined whether it
was equal to, similar, or different from the child’s. In addition, the CRA reviewed the credit
files for collections (such as utilities), credit actions (such as credit cards or mortgages),
victim statements, credit inquiries, public records, and employment information. Finally, the
CRA provided a report including estimated occurrences in the population for each of their
conclusions.
The SSA entity reviewed was the Office of Earnings, Enumeration, and Administrative Systems
under the Office of the Deputy Commissioner for Systems. This audit did not include an
evaluation of SSA’s internal controls over the wage reporting process. We also did not attempt
to establish the reliability or accuracy of the wage data. However, we determined that the MEF
and ESF data were sufficiently reliable for purposes of our review. Because the CRA is
recognized as an industry expert, we relied on it to analyze the credit files of foster children and
opine on the potential of SSN misuse. We conducted our audit from September 2012 through
May 2013 in Birmingham, Alabama. We conducted this performance audit in accordance with
generally accepted government auditing standards. Those standards require that we plan and
conduct the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our
findings and conclusions based on our audit objectives. We believe the evidence obtained
provides a reasonable basis for our findings and conclusions based on our audit objectives.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
A-2
15. Appendix B – AGENCY COMMENTS
SOCIAL SECURITY
MEMORANDUM
August 22, 2013
To:
S1J-3
Patrick P. O’Carroll, Jr.
Inspector General
From:
Refer To:
Katherine Thornton /s/
Deputy Chief of Staff
Subject:
Office of the Inspector General Draft Report, “Potential Misuse of Foster Children’s
Social Security Numbers” (A-08-12-11253)--INFORMATION
Thank you for the opportunity to review the draft report. Please see our attached comments.
Please let me know if we can be of further assistance. You may direct staff inquiries to
Gary S. Hatcher at (410) 965-0680.
Attachment
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
B-1
16. COMMENTS ON THE OFFICE OF THE INSPECTOR GENERAL DRAFT REPORT,
“POTENTIAL MISUSE OF FOSTER CHILDREN’S SOCIAL SECURITY NUMBERS”
(A-08-12-11253)
Recommendation 1
Partner with State and local governments to inform the foster care community about the potential
risks associated with collecting and using Social Security numbers (SSN) as identifiers or for
other purposes.
Response
We agree. Since fiscal year 2010, we have worked with State and local government agencies to
discourage the collection and use of SSNs as primary identifiers or for other tracking
purposes. We conduct outreach through conference calls, electronic “Dear Colleague” letters,
and newsletters. We will continue to partner with State and local government agencies.
Recommendation 2
Encourage State and local governments to reduce unnecessary collection and use of foster
children's SSNs and implement stringent safeguards to protect SSNs when collected. For
example, remove SSNs from foster children's identification cards and other caregiver paperwork.
Response
We agree. We will incorporate the report recommendations into our ongoing outreach efforts
(described above) to discourage State and local government agencies from collecting and using
SSNs.
Recommendation 3
Promote the best practices of States that have taken steps to address SSN misuse and identity
theft involving foster children.
Response
We agree. We will continue to promote best practices and encourage the use of alternative
identifiers (e.g., linking to Bureau of Vital Statistics and other State data sources) through our
ongoing outreach efforts.
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
B-2
17. Appendix C – MAJOR CONTRIBUTORS
Theresa Roberts, Acting Director, Atlanta Audit Division
Jeff Pounds, Audit Manager, Birmingham Office of Audit
Kathy Yawn, Senior Auditor
Potential Misuse of Foster Children’s SSNs (A-08-12-11253)
C-1
18. MISSION
By conducting independent and objective audits, evaluations, and investigations, the Office of
the Inspector General (OIG) inspires public confidence in the integrity and security of the Social
Security Administration’s (SSA) programs and operations and protects them against fraud,
waste, and abuse. We provide timely, useful, and reliable information and advice to
Administration officials, Congress, and the public.
CONNECT WITH US
The OIG Website (http://oig.ssa.gov/) gives you access to a wealth of information about OIG.
On our Website, you can report fraud as well as find the following.
•
OIG news
•
audit reports
•
investigative summaries
•
Semiannual Reports to Congress
Watch us on YouTube
•
fraud advisories
Like us on Facebook
•
press releases
•
congressional testimony
•
an interactive blog, “Beyond The
Numbers” where we welcome your
In addition, we provide these avenues of
communication through our social media
channels.
Follow us on Twitter
Subscribe to our RSS feeds or email updates
comments
OBTAIN COPIES OF AUDIT REPORTS
To obtain copies of our reports, visit our Website at http://oig.ssa.gov/audits-andinvestigations/audit-reports/all. For notification of newly released reports, sign up for e-updates
at http://oig.ssa.gov/e-updates.
REPORT FRAUD, WASTE, AND ABUSE
To report fraud, waste, and abuse, contact the Office of the Inspector General via
Website:
http://oig.ssa.gov/report-fraud-waste-or-abuse
Mail:
Social Security Fraud Hotline
P.O. Box 17785
Baltimore, Maryland 21235
FAX:
410-597-0118
Telephone:
1-800-269-0271 from 10:00 a.m. to 4:00 p.m. Eastern Standard Time
TTY:
1-866-501-2101 for the deaf or hard of hearing